ghsa-xgpm-q3mq-46rq
Vulnerability from github
Published
2024-01-03 21:41
Modified
2024-01-03 21:41
Severity ?
Summary
PrestaShop some attribute not escaped in Validate::isCleanHTML method
Details
Description
Some event attributes are not detected by the isCleanHTML method
Impact
Some modules using the isCleanHTML method could be vulnerable to xss
Patches
8.1.3, 1.7.8.11
Workarounds
The best workaround is to use the HTMLPurifier
library to sanitize html input coming from users. The library is already available as a dependency in the PrestaShop project. Beware though that in legacy object models, fields of HTML
type will call isCleanHTML
.
Reporters
Reported by Antonio Russo (@Antonio-R1 on GitHub) and Antonio Rocco Spataro (@antoniospataro on GitHub).
{ "affected": [ { "package": { "ecosystem": "Packagist", "name": "prestashop/prestashop" }, "ranges": [ { "events": [ { "introduced": "8.0.0-beta.1" }, { "fixed": "8.1.3" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Packagist", "name": "prestashop/prestashop" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.7.8.11" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-21627" ], "database_specific": { "cwe_ids": [ "CWE-20", "CWE-79" ], "github_reviewed": true, "github_reviewed_at": "2024-01-03T21:41:14Z", "nvd_published_at": "2024-01-02T21:15:10Z", "severity": "HIGH" }, "details": "### Description\nSome event attributes are not detected by the isCleanHTML method\n\n### Impact\nSome modules using the isCleanHTML method could be vulnerable to xss\n\n### Patches\n8.1.3, 1.7.8.11\n\n### Workarounds\nThe best workaround is to use the `HTMLPurifier` library to sanitize html input coming from users. The library is already available as a dependency in the PrestaShop project. Beware though that in legacy object models, fields of `HTML` type will call `isCleanHTML`.\n\n### Reporters\n\nReported by Antonio Russo (@Antonio-R1 on GitHub) and Antonio Rocco Spataro (@antoniospataro on GitHub).\n\n", "id": "GHSA-xgpm-q3mq-46rq", "modified": "2024-01-03T21:41:14Z", "published": "2024-01-03T21:41:14Z", "references": [ { "type": "WEB", "url": "https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-xgpm-q3mq-46rq" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21627" }, { "type": "WEB", "url": "https://github.com/PrestaShop/PrestaShop/commit/0ed1af8de500538490f88e9e794e2e8113fb8df7" }, { "type": "WEB", "url": "https://github.com/PrestaShop/PrestaShop/commit/73cfb44666818eefd501b526a894fe884dd12129" }, { "type": "WEB", "url": "https://github.com/PrestaShop/PrestaShop/commit/ba06d18466df5b92cb841d504cc7210121104883" }, { "type": "WEB", "url": "https://github.com/PrestaShop/PrestaShop/commit/f799dcff564cd1b7ead932ffc3343b675107dbce" }, { "type": "PACKAGE", "url": "https://github.com/PrestaShop/PrestaShop" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N", "type": "CVSS_V3" } ], "summary": "PrestaShop some attribute not escaped in Validate::isCleanHTML method" }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.